General
-
Target
452cdd21fdb616758bdcfe0972549a573cea280732ed3c8920d5d69583f64c7d
-
Size
678KB
-
Sample
221123-xajkaaed38
-
MD5
51e267ff5e27f6cdf799a759c96e4567
-
SHA1
adfc786b1baed0e34ac7a085eacef067a605fa72
-
SHA256
452cdd21fdb616758bdcfe0972549a573cea280732ed3c8920d5d69583f64c7d
-
SHA512
88be6b5ab809a4922f86689c289d3715dc6ad589913c6e0ff1a2cf3f20f7172a7104aca7e979bc4e372f173736e5e1a16927664b2445294f57cb1b07fd4360e4
-
SSDEEP
12288:2xdZl/ZqmGhIS0NCGD9kKsO7v6mDkFEzzEDhagRWsk:8D0beSQL3sWTkF6AVagVk
Static task
static1
Behavioral task
behavioral1
Sample
452cdd21fdb616758bdcfe0972549a573cea280732ed3c8920d5d69583f64c7d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
452cdd21fdb616758bdcfe0972549a573cea280732ed3c8920d5d69583f64c7d.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
noohkxueuadadesg
Targets
-
-
Target
452cdd21fdb616758bdcfe0972549a573cea280732ed3c8920d5d69583f64c7d
-
Size
678KB
-
MD5
51e267ff5e27f6cdf799a759c96e4567
-
SHA1
adfc786b1baed0e34ac7a085eacef067a605fa72
-
SHA256
452cdd21fdb616758bdcfe0972549a573cea280732ed3c8920d5d69583f64c7d
-
SHA512
88be6b5ab809a4922f86689c289d3715dc6ad589913c6e0ff1a2cf3f20f7172a7104aca7e979bc4e372f173736e5e1a16927664b2445294f57cb1b07fd4360e4
-
SSDEEP
12288:2xdZl/ZqmGhIS0NCGD9kKsO7v6mDkFEzzEDhagRWsk:8D0beSQL3sWTkF6AVagVk
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-